SlideShare a Scribd company logo
Soumettre la recherche
Mettre en ligne
S’identifier
S’inscrire
Cisco SecureX.pdf
Signaler
WildhaniIhyaraRahman1
Suivre
28 May 2023
•
0 j'aime
•
18 vues
1
sur
18
Cisco SecureX.pdf
28 May 2023
•
0 j'aime
•
18 vues
Télécharger maintenant
Télécharger pour lire hors ligne
Signaler
Technologie
Cisco Extended Detection and Response
WildhaniIhyaraRahman1
Suivre
Recommandé
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA Cyber Security
3.4K vues
•
48 diapositives
Building a Security Architecture
Cisco Canada
4.7K vues
•
68 diapositives
David Patterson IT Security Resumes 2016
David Patterson
748 vues
•
7 diapositives
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
Cisco DevNet
1.6K vues
•
31 diapositives
Cisco Connect Ottawa 2018 data centre security
Cisco Canada
156 vues
•
47 diapositives
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Quek Lilian
572 vues
•
22 diapositives
Contenu connexe
Similaire à Cisco SecureX.pdf
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
Cristian Garcia G.
197 vues
•
62 diapositives
IBM Relay 2015: Securing the Future
IBM
1.9K vues
•
23 diapositives
Cisco Endpoint Security for MSSPs
Cisco Russia
927 vues
•
25 diapositives
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
1.4K vues
•
22 diapositives
Windows 7 Security Enhancements
Presentologics
1.2K vues
•
43 diapositives
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Vinod Kumar
466 vues
•
35 diapositives
Similaire à Cisco SecureX.pdf
(20)
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
Cristian Garcia G.
•
197 vues
IBM Relay 2015: Securing the Future
IBM
•
1.9K vues
Cisco Endpoint Security for MSSPs
Cisco Russia
•
927 vues
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
•
1.4K vues
Windows 7 Security Enhancements
Presentologics
•
1.2K vues
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Vinod Kumar
•
466 vues
Architecting Secure Web Systems
InnoTech
•
1.7K vues
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
Nur Shiqim Chok
•
50 vues
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
NetworkCollaborators
•
116 vues
Securing Sensitive Data in Your Hybrid Cloud
RightScale
•
1.2K vues
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Cisco do Brasil
•
580 vues
Slide Griffin - Practical Attacks and Mitigations
EnergySec
•
547 vues
CIS Control Solution Guide
Lauren Bell
•
132 vues
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PROIDEA
•
314 vues
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
iQHub
•
12 vues
Scalar Security Roadshow - Ottawa Presentation
Scalar Decisions
•
852 vues
TechWiseTV Workshop: Cisco TrustSec
Robb Boyd
•
1.4K vues
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
Amazon Web Services
•
4.4K vues
Manoj Kumar_CA
Manoj Kumar M
•
446 vues
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
BGA Cyber Security
•
2.8K vues
Dernier
"From Orchestration to Choreography and Back", Yevhen Bobrov
Fwdays
33 vues
•
57 diapositives
LLaMA 2.pptx
RkRahul16
40 vues
•
19 diapositives
sap.pptx
SAP
34 vues
•
1 diapositive
"Architecture assessment from classics to details", Dmytro Ovcharenko
Fwdays
34 vues
•
16 diapositives
Product Research Presentation-Maidy Veloso.pptx
MaidyVeloso
35 vues
•
23 diapositives
How resolve Gem dependencies in your code?
Hiroshi SHIBATA
116 vues
•
50 diapositives
Dernier
(20)
"From Orchestration to Choreography and Back", Yevhen Bobrov
Fwdays
•
33 vues
LLaMA 2.pptx
RkRahul16
•
40 vues
sap.pptx
SAP
•
34 vues
"Architecture assessment from classics to details", Dmytro Ovcharenko
Fwdays
•
34 vues
Product Research Presentation-Maidy Veloso.pptx
MaidyVeloso
•
35 vues
How resolve Gem dependencies in your code?
Hiroshi SHIBATA
•
116 vues
Netwitness RT - Don’t scratch that patch.pptx
Stefano Maccaglia
•
105 vues
Easy Salesforce CI/CD with Open Source Only - Dreamforce 23
NicolasVuillamy1
•
441 vues
Supplier Sourcing_Cathy.pptx
CatarinaTorrenuevaMa
•
21 vues
Google cloud Study Jam 2023.pptx
GDSCNiT
•
364 vues
GDSC Cloud Lead Presentation.pptx
AbhinavNautiyal8
•
62 vues
Privacy in the era of quantum computers
Speck&Tech
•
86 vues
How is AI changing journalism? Strategic considerations for publishers and ne...
Damian Radcliffe
•
94 vues
Accelerating Data Science through Feature Platform, Transformers, and GenAI
FeatureByte
•
170 vues
Future of Skills
Alison B. Lowndes
•
65 vues
Demystifying ML/AI
Matthew Reynolds
•
41 vues
Advancing Equity and Inclusion for Deaf Students in Higher Education
3Play Media
•
154 vues
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
TrustArc
•
53 vues
h2 meet pdf test.pdf
JohnLee971654
•
62 vues
Machine learning with quantum computers
Speck&Tech
•
95 vues
Cisco SecureX.pdf
1.
Wildhani I R Cybersecurity
Specialist SecureX
2.
Agenda SecureX Value Proposition Understanding
SecureX Demo SecureX Automated Threat Hunting Investigation Demo SecureX Orchestration Custom Response Actions 1 2 3 4
3.
5 © 2022 Cisco
and/or its affiliates. All rights reserved. Cisco Public SecureX Value Proposition
4.
© 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential Top Customer Challenge Security Operations Technologies and Intelligence Is this thing bad? Has it affected us? How? Why? Web Security Network Analytics Next-Gen Firewall Email Security Third-Party Sources Secure Internet Gateway Next-Gen IPS Endpoint Security Threat Intel SIEM Identity Management Malware Detection Security Does Not Work Together
5.
© 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential Investigation Remediation Managed Policy Orchestration Automation Detection Analytics Unified Visibility What is SecureX Customer Infrastructure SIEM/SOAR Identity Third-Party/ITSM Intelligence Cisco Secure Applications Cloud Network Endpoint A Cloud-Native, Built-In Platform Experience Within Our Portfolio Customer Teams ITOps NetOps SecOps
6.
© 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential SecureX Unlocks Value for Your Customers Integrations built-in, pre-built or custom Ribbon & Sign-on never leaves you maintains context Dashboard customizable for what matters to you Threat Response is at the core of the platform Orchestration drag-drop GUI for no/low code Unified In One Location for Maximized Operational Integrated & Open for Simplicity Visibility Efficiency Device Insights device inventory with the contextual awareness
7.
6 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential How true simplicity is experienced Before: 32 minutes 2. Investigate incidents in multiple consoles Product dashboard 1 Product dashboard 2 Product dashboard 3 Product dashboard 4 3. Remediate by coordinating multiple teams Product dashboard 1 Product dashboard 2 Product dashboard 3 Product dashboard 4 1. IOC/alert After: 5 minutes SecureX threat response is integrated across your security infrastructure SHA - 256 IP Target endpoint Email Query intel and telemetry from multiple integrated products Subject Quickly visualize the Threat impact in your environment Remediate directly from one UI In one view Malicious domain
8.
© 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential Cisco Infrastructure Third-Party Infrastructure IT service management, and cloud/virtual and DevOps platforms General Toolsets Scripting/dev tools, system interfaces, data exchanges, and messaging protocols Networking, collaboration, server/ app, and Multicloud management platforms Third-Party Security Operational tools, intelligence sources, infrastructure protections and visibility Meaningful Integrations to Protect your Network HTTP SMTP SNMP …and more! ACI UCS Director CloudCenter DNA Center Cisco Webex
9.
8 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential A new level of visibility with SecureX dashboard Understand what matters in one view across your security infrastructure • Applications (left) View, launch or trial the integrated products • Tiles (middle) Presents metrics and operational measures from the integrated products • News (right) Product updates, industry news, and blog posts
10.
9 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential I make automated playbook changes in minutes with a drag- drop interface My top 5 most frustrating tasks have all be automated We have never communicated faster: Our approvals are automated Maximizing operational efficiency After: I combined 9 tasks across 3 security tools, 2 infrastructuresystems, and 3 teams in one keystroke! Solution:Orchestrating security across the full lifecycle Before: Repetitive, human-poweredtasks ALERT task: REMEDIATE Cisco or non-Cisco infrastructure Pre-built or customizable workflows task task task task while loop condition Go To: SecureX threat response deep dive Outdated playbook Automation script that works “sometimes” Playbook Integration script that no longer works
11.
14 © 2022 Cisco
and/or its affiliates. All rights reserved. Cisco Public Understanding SecureX
12.
11 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential SecOps The process of consulting all the modules to find out what any of them know about the observable(s). Enrichment DNS security Etc.. EPP NGIPS EPP logs NGIPS logs DNS logs Etc. SecureX threat response File Analysis Etc . IP reputation Domain reputation
13.
12 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential SecOps DNS security Etc.. EPP NGIPS SecureX threat response EPP logs NGIPS logs DNS logs Etc. File Analysis Etc . IP reputation Domain reputation Enrichment The process of consulting all the modules to find out what any of them know about the observable(s).
14.
13 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential SecOps Enrichment DNS security Etc.. EPP NGIPS EPP logs NGIPS logs DNS logs Etc. SecureX threat response File Analysis Etc . IP reputation Domain reputation The process of consulting all the modules to find out what any of them know about the observable(s).
15.
14 SecOps The process of
leveraging the capabilities of SecureX-enabled technologies to mitigate threats by acting on observables or targets Response DNS security Etc.. EPP NGIPS EPP logs NGIPS logs DNS logs Etc. SecureX threat response File Analysis Etc . IP reputation Domain reputation © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
16.
15 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential SecOps DNS security Etc.. EPP NGIPS SecureX threat response EPP logs NGIPS logs DNS logs Etc. File Analysis Etc . IP reputation Domain reputation Response The process of leveraging the capabilities of SecureX-enabled technologies to mitigate threats by acting on observables or targets
17.
16 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential I’m a Cisco Secure customer with SecureX threat response My team can: Answer questions faster about observables. Block and unblock domains from threat response. Isolate Hosts Hunt for an observable associated with a known actor and immediately see organizational impact. Save a point in time snapshot of our investigations for further analysis. Document our analysis in a cloud casebook from all integrated or web-accessible tools, via an API. Integrate threat response easily into existing processes and custom tools Store our own threat intel in threat response private intel for use in investigations See Incidents all in one place Block and unblock file executions from threat response